Custom Query (2082 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (101 - 200 of 2082)

1 2 3 4 5 6 7 8 9 10 11 12
Ticket Summary Status Owner Type Priority Milestone
#20594 hs: Make HSDir produce HS statistics for prop224 new enhancement High Tor: unspecified
#20647 Tor and Chutney CI improvements new enhancement High Tor: 0.4.4.x-final
#20835 Refactor choose_good_entry_server so it is (almost) never used new task High Tor: unspecified
#21253 Add link handshakes to benchmark program needs_revision task High Tor: unspecified
#21478 Extend HTTP fuzzer so it fuzzes the POST handler functions new enhancement High Tor: unspecified
#21509 Fuzz v3 hidden services new task High Tor: unspecified
#21935 prop224: Deeper testing of HS ntor subsystem new defect High Tor: unspecified
#22204 I can't list a relay in my EntryNodes if it doesn't have the Guard flag new defect High Tor: unspecified
#22331 Tor needs to stop trying to read directories before it changes users new defect High Tor: 0.4.4.x-final
#22422 Add noise to PaddingStatistics new defect High Tor: unspecified
#22825 test: Add unit tests for circuit_send_next_onion_skin() new enhancement High Tor: unspecified
#23116 tor stops responding to Ctrl-C and circuits while in infinite descriptor download loop new defect High Tor: unspecified
#23289 Improving HS reachability for Orbot/Android users new n8fr8 enhancement High Tor: unspecified
#23508 large clock skews cause numerous bootstrap UX issues new defect High Tor: unspecified
#23573 Do we want to close all connections when tor closes? needs_revision enhancement High Tor: unspecified
#23744 sched: Notification events have different meaning for each scheduler new defect High Tor: unspecified
#23764 hs-v3: No live consensus on client with a bridge new defect High Tor: unspecified
#23882 Investigate implementing a Rust allocator wrapping tor_malloc new enhancement High Tor: unspecified
#24061 Collect Baseline Measurements for Different Android Performance Metrics new project High Tor: unspecified
#24487 Reverse path selection (choose outer hops first) new defect High Tor: unspecified
#24619 Tor 0.3.1.9 exited unexpectedly on Windows new defect High Tor: unspecified
#24857 Tor uses 100% CPU when accessing the cache directory on Windows assigned ahf defect High Tor: 0.4.4.x-final
#24935 Add (local) statistics to check accuracy of predicted circuit mechanism new enhancement High Tor: unspecified
#25118 We need circuit launch and cannibalization unit tests needs_revision defect High Tor: unspecified
#25140 Parse only .torrc files in torrc.d directory needs_review Jigsaw52 task High Tor: 0.4.4.x-final
#25141 enabling CellStatistics results in gigabytes of incremental memory consumption new defect High Tor: unspecified
#25372 relay: Allocation for compression goes very high new defect High Tor: unspecified
#25386 Link Rust Tests to C Dependencies in Tor (allow integration testing from Rust to C) new defect High Tor: unspecified
#25461 main event-loop spins consuming 100% of a CPU core running scheduler_set_channel_state new defect High Tor: unspecified
#25715 Ubuntu bionic LTS freezes this month and currently contains Tor 0.3.2.x new task High Tor: unspecified
#25918 Standardize the 'onion service' name new defect High Tor: unspecified
#27049 "No circuits are opened" messages with onion services needs_revision mikeperry defect High Tor: unspecified
#27331 Non-fatal assertion ent->cdm_diff_status != CDM_DIFF_PRESENT failed in cdm_diff_ht_check_and_note_pending at src/or/consdiffmgr.c:272 new defect High Tor: unspecified
#27435 Poland, PLAY operator and OBFS4 new dcf defect High Tor: unspecified
#27436 Rejected v3 descriptor (2018 September edition) new defect High Tor: unspecified
#27468 CI: add builds with the latest clang and gcc new enhancement High Tor: unspecified
#27915 Make rust doctests get linked in same way as other rust tests new defect High Tor: unspecified
#27971 Still supports 1024 bit keys needs_revision defect High Tor: unspecified
#28244 Followup tasks for Rust asan CI fixes new defect High Tor: unspecified
#28356 DataDirectoryGroupReadable and CacheDirectoryGroupReadable conflicts forcing sandboxed Tor to crash new defect High Tor: unspecified
#28679 Bridge connections on startup new enhancement High Tor: unspecified
#28849 Handle dormant mode in process library and for PT's needs_information enhancement High Tor: unspecified
#28992 Bug: ../src/feature/hs/hs_client.c:571: send_introduce1: Non-fatal assertion !(ip == NULL) failed. merge_ready dgoulet defect High Tor: 0.4.2.x-final
#29098 Load balance properly in the presence of padding overhead new enhancement High Tor: unspecified
#29136 PT_LOG and PT_STATUS event fields unspecifed needs_revision atagar defect High Tor: 0.4.4.x-final
#29494 Optimize interaction between circuitmux and circuitpadding needs_revision mikeperry enhancement High Tor: unspecified
#29583 HSv3: Faulty cross-certs in introduction point keys (allows naive onionbalance for v3s) new defect High Tor: unspecified
#29645 test.exe hangs on Appveyor CI reopened ahf defect High Tor: 0.4.4.x-final
#29927 Tor protocol errors causing silent dropped cells new defect High Tor: unspecified
#30187 100% cpu usage in winthreads tor_cond_wait assigned ahf defect High Tor: unspecified
#31056 Hidden service sometimes unable to create circuit new defect High
#31149 Tor is stuck at "Loading Network Status" needs_information defect High Tor: unspecified
#31757 test_parseconf.sh: apparently not reliable on Appveyor assigned defect High Tor: unspecified
#32088 Proposal 310 - choose guards in sampled order needs_revision enhancement High Tor: 0.4.4.x-final
#32195 Rename net_is_disabled, net_is_completely_disabled, and PERIODIC_EVENT_FLAG_NEED_NET new defect High Tor: unspecified
#32564 Assertion pol->magic failed needs_information defect High Tor: 0.4.4.x-final
#32678 Exit relay DNS cache leaks information new defect High Tor: unspecified
#32703 Unable to load some sites (Cloudflare) over Tor new defect High
#32718 Crash: Consensus diff src/lib/memarea/memarea.c:147: memarea_chunk_free_unchecked needs_information nickm defect High Tor: unspecified
#32868 crash: Assertion node->rs->is_possible_guard failed in compute_weighted_bandwidths at needs_information nickm defect High Tor: 0.4.4.x-final
#33119 Resolve TROVE-2020-001 needs_review ahf defect High Tor: 0.4.4.x-final
#33344 mmdb-convert and fresh MMDB - error new defect High
#33469 INTERNAL ERROR: Raw assertion failed at src/lib/malloc/map_anon.c:239: lock_result == 0 new defect High Tor: 0.4.4.x-final
#33861 vanguards: circ_max_megabytes applied to all connection new task High Tor: unspecified
#33898 Stop modifying addr on connections, and delete real_addr assigned nickm defect High Tor: 0.4.4.x-final
#34139 Build Tor without warnings or test failures with OpenSSL 3.0.0 new enhancement High Tor: 0.4.4.x-final
#1136 When Tor is offline, it doesn't quite run out of relays, so doesn't realize it's offline new defect Medium Tor: unspecified
#1889 Contradictory bandwidth reports in overlapping extra-info descriptors new defect Medium Tor: unspecified
#2003 Hibernation Soft and Hard Limits Reached Simultaneously assigned Sebastian enhancement Medium Tor: unspecified
#2077 Overwriting files can fail on Windows needs_information defect Medium Tor: unspecified
#2179 Stream fairness: Stop packaging inbufs onto circuits greedily new enhancement Medium Tor: unspecified
#2180 We should test for fairness on entry and exit connections new enhancement Medium Tor: unspecified
#2282 Publish router descriptors rejected by the authorities or omitted from the consensus new enhancement Medium Tor: unspecified
#2395 Break Wed and Wee weights into two classes each new enhancement Medium Tor: unspecified
#2455 Log IP of wrongly replying DNS-Server(s) needs_revision enhancement Medium Tor: unspecified
#2506 Design and implement a more compact GeoIP file format assigned endian7000 enhancement Medium Tor: unspecified
#2628 Be smarter about launching connections to authorities to learn about clock skew new project Medium Tor: unspecified
#2664 DoS and failure resistence improvements new enhancement Medium Tor: unspecified
#2667 Exits should block reentry into the tor network new defect Medium Tor: unspecified
#2681 brainstorm ways to let Tor clients use yesterday's consensus more safely new enhancement Medium Tor: unspecified
#2693 Design and implement improved algorithm for choosing consensus method new enhancement Medium Tor: unspecified
#2715 Is rephist-calculated uptime the right metric for HSDir assignment? new enhancement Medium Tor: unspecified
#2743 safelogging should cover hidden service name and intro-points too assigned rransom defect Medium Tor: unspecified
#2914 Tor should truncate log file if loglevel < notice needs_revision defect Medium Tor: unspecified
#2967 bad pidfile handling on ENOSPC new defect Medium Tor: unspecified
#2983 Errant circuit creation beyond MAPADDRESS validity new defect Medium Tor: unspecified
#2991 Confusing log messages when a DA starts using a new key new defect Medium Tor: unspecified
#2998 If your bridge is near your exit, Tor might surprise you by failing your circuit new defect Medium Tor: unspecified
#3029 We should save received documents before parsing them new enhancement Medium Tor: unspecified
#3037 Internal checks to detect client streams/circuits whose sock request vanished new enhancement Medium Tor: unspecified
#3080 Bug: The application request to "jabber.org":5222 has launched 10 circuits without finding one it likes. new defect Medium Tor: unspecified
#3145 excludeexitnodes by ip misleading when exit relay uses outboundbindaddress new enhancement Medium Tor: unspecified
#3217 When bridges change, only close the circuits for the bridges we stopped using new enhancement Medium Tor: unspecified
#3241 Seeing lots of "crypto error while reading public key from string" on DA new defect Medium Tor: unspecified
#3322 We don't retry our bridges if we have an unconfigured bridge that's up new defect Medium Tor: unspecified
#3520 CIRC FAILED REASON=DESTROYED events do not specify which hop sent the RELAY_TRUNCATED cell new rransom enhancement Medium Tor: unspecified
#3587 Accounting should work with pluggable transports new defect Medium Tor: unspecified
#3767 Allow Tor to listen on a specific interface for ORPort new enhancement Medium Tor: unspecified
#3782 Add native chroot support to Tor new enhancement Medium Tor: unspecified
#3863 Do something smarter with Windows Tor crash dumps reopened tbb-team task Medium Tor: unspecified
1 2 3 4 5 6 7 8 9 10 11 12
Note: See TracQuery for help on using queries.